Deep Web

Mapping the Dark Web searching for illegal contentMapping the Dark Web searching for illegal content

Mapping the Dark Web searching for illegal content

Recently the intelligence firms Intelliagg and Darksum have issued an interesting report on the Dark Web and related mapping. We…

9 years ago
CloudFlare considers 94 percent of the Tor traffic as “per se malicious”CloudFlare considers 94 percent of the Tor traffic as “per se malicious”

CloudFlare considers 94 percent of the Tor traffic as “per se malicious”

Experts at CloudFlare revealed that 94 percent of the Tor traffic they see is “per se malicious,” but Tor Project…

9 years ago
Feds request Judge to review the order to reveal TOR Exploit CodeFeds request Judge to review the order to reveal TOR Exploit Code

Feds request Judge to review the order to reveal TOR Exploit Code

FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed…

9 years ago
Terrorists and dark web, what is their relationship?Terrorists and dark web, what is their relationship?

Terrorists and dark web, what is their relationship?

A new study reveals that terrorist organizations are largely uninterested in using resources and services hosted on the dark web.…

9 years ago
Tor Project and the new anti-tampering measures for its softwareTor Project and the new anti-tampering measures for its software

Tor Project and the new anti-tampering measures for its software

Tor Project revealed how the organization has conducted a three-year long work to improve its ability to detect fraudulent software.…

9 years ago
A deep look into the Brazilian underground cyber-marketA deep look into the Brazilian underground cyber-market

A deep look into the Brazilian underground cyber-market

Trend Micro has published a new study on black cyber-markets focusing on product and services offered on the Brazilian underground.…

11 years ago
81 percent of Tor clients can be identified with traffic analysis attack81 percent of Tor clients can be identified with traffic analysis attack

81 percent of Tor clients can be identified with traffic analysis attack

The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis…

11 years ago
The good and the bad of the Deep WebThe good and the bad of the Deep Web

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago
Traveling the Silk Road, study of the famous market placesTraveling the Silk Road, study of the famous market places

Traveling the Silk Road, study of the famous market places

Yes Guys, when we think to the deep web the media tell us only about its dark side, it's considered…

13 years ago
Citadel trojan, migration of cybercrime to the deep webCitadel trojan, migration of cybercrime to the deep web

Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber…

13 years ago